Actall PALS 9K Installation Manual Download Page 9

9

PALS Installation Manual

CRISIS CONTROLLER©™ NETWORKING

The Crisis Controller©™ software can be networked either peer-to-peer or using a dedicated file server. In either 

case, each machine on the network running Crisis Controller©™ must have an Alert Monitoring Hardware Key 

installed at all times.

Warning:

 

All  Hardware  Keys  must  remain  on  the  machines  where  they  were  initially  installed  and  never  relocated  or 

removed for any reason. Doing so will cause undesired results and void all warranties implied or otherwise, unless 

specifically directed by Actall® Technical Support.

  

  If you are unfamiliar with your operating system or you are unfamiliar with the  

 

 

  intricacies of the network being used, please do not attempt to use the network 

 

 

  function of the Crisis Controller©™. Doing so may cause permanent damage to your  

 

 

 

Crisis Controller©™ data files. Network installations should only be done by trained  

 

 

 

Network Technicians.

 

 

 

All connections in a Crisis Controller©™ networked system should be capable of no less  

 

 

 

than 100 Mb. In addition, all machines should be connected using a hub (or switch)  

 

 

 

rated at no less than 100 Mb.

 

 

  The following is a guide for establishing the Crisis Controller Network only. All Network  

 

 

  Hardware (Network cards and Hub/Switch) and appropriate drivers should be 

 

 

  installed and their operation verified prior to proceeding to the Network setup for  

 

 

 

Crisis Controller. For instructions on establishing a peer-to-peer or client/server 

 

 

 

network, consult the required documentation on operating system being used for this  

 

 

 

configuration.

A peer-to-peer network is the most common method used for

PALS installations. The network hardware should be connected

and their operation verified prior to proceeding to the network

installation of the Crisis Controller©™.

•      

Name each machine with a unique name (i.e. Monitor1,  

 

Admin 1, etc).

•      

Configure each machine to AUTOLOGIN to the Network.   

 

You should consult your operating system documentation  

 

for detailed instructions.

•  

The CPU named Monitor 1 will serve as the main server. Share the Crisis Controller directory, with full  

 

access, under drive properties [under NT, 2000, and XP you must also set access rights - See Operating  

 

System documentation for detailed instructions.] The Crisis Controller directory will consist of the  

 

installation path of the Crisis Controller©™ software (the default directory when the Crisis Controller©™  

 

software is installed is: C:\Program Files\Alert).

How to Install the Software

Summary of Contents for PALS 9K

Page 1: ...PALS 9K Installation Manual Version 4 0 www actall com...

Page 2: ...ages of any kind including but not limited to special general incidental direct or consequential dam ages for loss of business profits business interruption loss of business information or any other p...

Page 3: ...oftware Installation 9 CRISIS CONTROLLER HARDWARE 11 Hardware Key 11 Serial Watchdog 11 Serial Receiver 13 Repeaters 13 Input Output Module SIO32 14 Paging 16 Printer 16 Wireless Transmitters 16 IRTs...

Page 4: ...range help prevent signal interference and ensure that the signal is received Serial Receiver s identify valid messages decodes them and transmits that data to the Crisis Controller software for alar...

Page 5: ...plugged into the programming jack of the PMT and threaded through clothing that may inadvertently cover the PMT The Lapel Reader has approximately the same IR sensitivity as the PMT and can be used to...

Page 6: ...a regular basis Infrared transmitters IRTs send coded digital messages to an infrared receiver Each message contains data identifying the IRT Locator ID IRTs should be ceiling mounted on opposite side...

Page 7: ...Controller software verify that Crisis Controller is not running or in the process of upgrading either on the current machine or on a machine attached via the network Irrevocable damage to your data m...

Page 8: ...re this permits the appropriate files to be backed up as well as translated for utilization in the new software If this is a network installation make sure the file server drive has been selected i e...

Page 9: ...llowing is a guide for establishing the Crisis Controller Network only All Network Hardware Network cards and Hub Switch and appropriate drivers should be installed and their operation verified prior...

Page 10: ...name Servername would be the name of your server i e MONITOR 1 and sharename would be the name of the file share that is accessible from the network Once all modifications have been done click Apply a...

Page 11: ...r is inserted into the parallel port NOT the serial port The Serial Watchdog is a serial device that verifies the continued operation of a machine while monitoring It is attached only by the card brac...

Page 12: ...r software Once installed the Serial Watchdog is activated by entering the Alarm Monitoring mode on that machine only the machine with the watchdog is protected It is sent commands using the same seri...

Page 13: ...For greater distances serial line drivers can be used It should be mounted in a vertical position with antennas upright It is recommended that the antennas should never come near metal objects Repeate...

Page 14: ...the two screws from the top of the unit screws are diagonal with respect to each other Inserts in the cover can be removed from the Output and the Input end of the board to permit wiring to the termi...

Page 15: ...ccomplished by setting the 8 position DIP switch Positions 1 4 set Input or Output options for the SIO32 in banks of 8 If switches are in the Off position respective points are designated as Outputs O...

Page 16: ...etails The system accommodates multiple pager services with service to all types of pagers When programmed or manually instructed to send a page the system calls the pager service assigned to the page...

Page 17: ...tters carried for personal protection by guards or watchmen In these applications it is extremely valuable to have a system that not only responds to alarms but can also provide information on the loc...

Page 18: ...es A single power source can operate a Master and up to 5 Slaves if power supply is adequate Master and Slave Locators should be connected with 3 conductor 24 to 22 gauge wire Total combined wire run...

Page 19: ...he IRT This situation is addressed by using sets of IRTs IRT Slaves may be operated in conjunction with IRT Masters They transmit the same location data as the Master at 5 10 lower power Strategically...

Page 20: ...to transmitter messages indicating which Locator device was the first to pick up a signal directly from the transmitter Wireless RF Locators are typically used to provide approximate origination sign...

Page 21: ...the doors at the end of the long hallway if they are used for egress to the areas outside the building Wireless RF Locators must be used in conjunction with IRT exit points on the PALS 9000 Due to the...

Page 22: ...nd of line resistors can cause a trouble warning to be generated indicating that the transmitter has been damaged or disturbed Make sure when programming transmitters after attaching the programming c...

Page 23: ...without jumper 25mA Maximum power dissipation 2 watts Open field range with jumper in HI 125 feet Open field range with jumper in LO 80 feet Open field range without jumper 40 feet Supply Slave IRT Lo...

Page 24: ...Actall Corporation 2017 Curtis Street Denver CO 80205 www actall com 303 226 4799...

Reviews: